URL: https://applesan.top/
Submission: On February 18 via automatic, source certstream-suspicious — Scanned from NL

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 4 HTTP transactions. The main IP is 2a06:98c1:3121::c, located in United States and belongs to CLOUDFLARENET, US. The main domain is applesan.top.
TLS certificate: Issued by GTS CA 1P5 on February 18th 2023. Valid for: 3 months.
This is the only time applesan.top was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Cloudflare (Online)

Downloads These files were downloaded by the website

Size: 544 MB (570796032 bytes, 0% done)
Downloaded from: https://download.microsoft.com/download/b/3/7/b375974d-d9a8-454e-b929-4ed9b8020121/6001.18000.080118-1840_x86fre_wave1_ServicePackInstaller-FRMCSP1_CD1.iso

Domain & IP information

IP Address AS Autonomous System
2 5 2a06:98c1:312... 13335 (CLOUDFLAR...)
1 2a02:26f0:f70... 20940 (AKAMAI-ASN1)
4 2
Apex Domain
Subdomains
Transfer
5 applesan.top
applesan.top
8 KB
1 microsoft.com
download.microsoft.com — Cisco Umbrella Rank: 9342
4 2
Domain Requested by
5 applesan.top 2 redirects applesan.top
1 download.microsoft.com
4 2

This site contains links to these domains. Also see Links.

Domain
www.cloudflare.com
Subject Issuer Validity Valid
*.applesan.top
GTS CA 1P5
2023-02-18 -
2023-05-19
3 months crt.sh
akamai.download.microsoft.com
Microsoft Azure TLS Issuing CA 02
2022-12-21 -
2023-06-19
6 months crt.sh

This page contains 1 frames:

Frame: https://download.microsoft.com/download/b/3/7/b375974d-d9a8-454e-b929-4ed9b8020121/6001.18000.080118-1840_x86fre_wave1_ServicePackInstaller-FRMCSP1_CD1.iso
Frame ID: 1D7C5F6D46AB29943402BCBFBC6F1BF6
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Suspected phishing site | Cloudflare

Page Statistics

4
Requests

100 %
HTTPS

100 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

7 kB
Transfer

29 kB
Size

6
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • https://applesan.top/cdn-cgi/phish-bypass?atok=YVROnNjlL4ozY4fzdMauE_WJqsrQ5WOy.csfoUhjPoU-1676729539-0-%2F HTTP 301
  • https://applesan.top/ HTTP 302
  • https://download.microsoft.com/download/b/3/7/b375974d-d9a8-454e-b929-4ed9b8020121/6001.18000.080118-1840_x86fre_wave1_ServicePackInstaller-FRMCSP1_CD1.iso

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
applesan.top/
5 KB
2 KB
Document
General
Full URL
https://applesan.top/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3121::c , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
17c5ff4b7c541db52a5251393a8973246e81b931da53d18632f081d1b16ef529
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.100 Safari/537.36
accept-language
nl-NL,nl;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-ray
79b75b67892735e4-FRA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Sat, 18 Feb 2023 14:12:19 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=yacnCDijDzKPBsEDlOFp1gUTQkAFROPtNFTtHIizMm2Fxn3M740vHz0JFpj1Q93%2BhxkVKhfVGN0TGSIOQeeqlxkK4XJk681WtHJ6ZTudd2FzWvjGvW3DSPZonQXmAWFKREwFPnHf%2BFnD9eM%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
cf.errors.css
applesan.top/cdn-cgi/styles/
24 KB
5 KB
Stylesheet
General
Full URL
https://applesan.top/cdn-cgi/styles/cf.errors.css
Requested by
Host: applesan.top
URL: https://applesan.top/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3121::c , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
https://applesan.top/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.100 Safari/537.36

Response headers

date
Sat, 18 Feb 2023 14:12:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 15 Feb 2023 14:30:42 GMT
server
cloudflare
etag
W/"63ecec92-5e44"
x-frame-options
DENY
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=7200, public
cf-ray
79b75b67b97535e4-FRA
expires
Sat, 18 Feb 2023 16:12:19 GMT
icon-exclamation.png
applesan.top/cdn-cgi/images/
452 B
540 B
Image
General
Full URL
https://applesan.top/cdn-cgi/images/icon-exclamation.png?1376755637
Requested by
Host: applesan.top
URL: https://applesan.top/cdn-cgi/styles/cf.errors.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3121::c , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
https://applesan.top/cdn-cgi/styles/cf.errors.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.100 Safari/537.36

Response headers

date
Sat, 18 Feb 2023 14:12:19 GMT
x-content-type-options
nosniff
last-modified
Wed, 15 Feb 2023 14:30:42 GMT
server
cloudflare
etag
"63ecec92-1c4"
x-frame-options
DENY
vary
Accept-Encoding
content-type
image/png
cache-control
max-age=7200, public
accept-ranges
bytes
cf-ray
79b75b67e9c035e4-FRA
content-length
452
expires
Sat, 18 Feb 2023 16:12:19 GMT
6001.18000.080118-1840_x86fre_wave1_ServicePackInstaller-FRMCSP1_CD1.iso
download.microsoft.com/download/b/3/7/b375974d-d9a8-454e-b929-4ed9b8020121/
Redirect Chain
  • https://applesan.top/cdn-cgi/phish-bypass?atok=YVROnNjlL4ozY4fzdMauE_WJqsrQ5WOy.csfoUhjPoU-1676729539-0-%2F
  • https://applesan.top/
  • https://download.microsoft.com/download/b/3/7/b375974d-d9a8-454e-b929-4ed9b8020121/6001.18000.080118-1840_x86fre_wave1_ServicePackInstaller-FRMCSP1_CD1.iso
0
0
Document
General
Full URL
https://download.microsoft.com/download/b/3/7/b375974d-d9a8-454e-b929-4ed9b8020121/6001.18000.080118-1840_x86fre_wave1_ServicePackInstaller-FRMCSP1_CD1.iso
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:f700:293::317f Vienna, Austria, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash

Request headers

Referer
https://applesan.top/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.100 Safari/537.36
accept-language
nl-NL,nl;q=0.9

Response headers

Accept-Ranges
bytes
Connection
keep-alive
Content-Length
570796032
Content-Type
application/octet-stream
Date
Sat, 18 Feb 2023 14:12:25 GMT
ETag
"0x8D6334A720A57A1"
Last-Modified
Tue, 16 Oct 2018 09:33:35 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
x-ms-blob-content-md5
zONlmEyHVOI0o4AQw2BY6w==

Redirect headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cache-control
no-store, no-cache, must-revalidate
cf-cache-status
DYNAMIC
cf-ray
79b75b862b649bca-FRA
content-type
text/html; charset=UTF-8
date
Sat, 18 Feb 2023 14:12:24 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
https://download.microsoft.com/download/b/3/7/b375974d-d9a8-454e-b929-4ed9b8020121/6001.18000.080118-1840_x86fre_wave1_ServicePackInstaller-FRMCSP1_CD1.iso
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
pragma
no-cache
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=9Q0MRYwnrAk7%2BgyXwgmgmMIiIcdRGzVmAhBnXtaL8SarusWUWogrgPxta%2BHkYGW92CPWlF6%2FiPH0NlVYd24WDNvRkCXRwruOFpc5GAPRiVgWqZFupL1UifGoIdk8w7MpADQXyXvIMfLIqI4%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Cloudflare (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| oncontentvisibilityautostatechange object| _cf_translation

6 Cookies

Domain/Path Name / Value
.applesan.top/ Name: __cf_mw_byp
Value: YVROnNjlL4ozY4fzdMauE_WJqsrQ5WOy.csfoUhjPoU-1676729539-0-/
applesan.top/ Name: PHPSESSID
Value: 4a7r94nmdauv12qdk3feurt600
applesan.top/ Name: pais
Value: NL
applesan.top/ Name: estado
Value: CFXX
applesan.top/ Name: cidade
Value: CFXX
applesan.top/ Name: uid
Value: 932.99475.4804.609758

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

applesan.top
download.microsoft.com
2a02:26f0:f700:293::317f
2a06:98c1:3121::c
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
17c5ff4b7c541db52a5251393a8973246e81b931da53d18632f081d1b16ef529
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016